flesueur / mi-lxcView external linksLinks
Mini-Internet using LXC for practical works
☆344Mar 28, 2025Updated 10 months ago
Alternatives and similar repositories for mi-lxc
Users that are interested in mi-lxc are comparing it to the libraries listed below
Sorting:
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆147Feb 12, 2025Updated last year
- D4 core software (server and sample sensor client)☆42Dec 23, 2023Updated 2 years ago
- ☆16May 6, 2015Updated 10 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Jun 20, 2022Updated 3 years ago
- Tools used by CSIRT and especially in the scope of CNW☆17Jan 14, 2026Updated last month
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- ☆18Aug 4, 2020Updated 5 years ago
- Python module to use the MISP Taxonomies☆31Jan 9, 2026Updated last month
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 6 years ago
- Here I share the code of my CV, which is also a bootable bootloader :)☆524Oct 28, 2025Updated 3 months ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- ☆21Nov 13, 2019Updated 6 years ago
- ☆15Mar 13, 2018Updated 7 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Jan 21, 2026Updated 3 weeks ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Jan 8, 2019Updated 7 years ago
- This repository has been combined with mac-tracker project and no longer receives updates.☆575Jun 22, 2025Updated 7 months ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Apr 14, 2025Updated 10 months ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 4 months ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Nov 3, 2025Updated 3 months ago
- Simple, fast dictionary-based language detector for short texts.☆20Feb 5, 2026Updated last week
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- Swordphish Phishing Awareness Tool☆225Sep 22, 2024Updated last year
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- ☆14May 30, 2018Updated 7 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- A modern Python-3-based alternative to RegRipper☆204Mar 31, 2025Updated 10 months ago
- BlueKeep scanner supporting NLA☆167Jul 18, 2019Updated 6 years ago
- Outlook add-in companion to report suspicious mail easily☆133Sep 1, 2022Updated 3 years ago